Nowadays Hacking has been one of the common practices made by the computer expert in order to try and find vulnerabilities in a network infrastructure. AbstractIntroduction

Hacking Refers Mainly To Ability Of One To Understand The Computers Very Deeply And Change its Inner Mechanism Without Having Enough Permissions.So that hacker is a clever programmer that doing the hacking. [1]

Three

type of

Hacking[3]http://community.norton.com/en/blogs/norton-protection-blog/what-difference-between-black-white-and-grey-hat-hackersBlack Hat Hackersblack hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.Their primary motivation is usually for personal or financial gain, but they can also be involved in cyber espionage, protest or perhaps are just addicted to the thrill of cyber crime.Not only do black hat hackers seek to steal data, they also seek to modify or destroy data as well.(3)White hat hackers choose to use their powers for good rather than evil. Also known as “ethical hackers,” White hat hackers can sometimes be paid employees or contractors working for companies as security specialists that attempt to find security holes via hacking.White hat hackers employ the same methods of hacking as black hats, with one exception- they do it with permission from the owner of the system first, which makes the process completely legal. White hat hackers perform penetration testing, test in-place security systems and perform vulnerability assessments for companies. (3)

White hat hackerGrey Hat HackerA gray-hat hacker falls somewhere between a black hat and a white hat. A gray hat doesn’t work for their own personal gain or to cause carnage, but they may technically commit crimes and do arguably unethical things.

A gray-hat hacker might attempt to compromise a computer system without permission, informing the organization after the fact and allowing them to fix the problem. While the gray-hat hacker didn’t use their access for bad purposes, they compromised a security system without permission, which is illegal.If a gray-hat hacker discovers a security flaw in a piece of software or on a website, they may disclose the flaw publically instead of privately disclosing the flaw to the organization and giving them time to fix it. They wouldn’t take advantage of the flaw for their own personal gain — that would be black-hat behavior — but the public disclosure could cause carnage as black-hat hackers tried to take advantage of the flaw before it was fixed.(1)The terms come from old spaghetti westerns, where the bad guy wears a black cowboy hat, and the good guy wears a white hat. (3)There are two main factors that determine the type of hacker you’re dealing with: their motivations, and whether or not they are breaking the law. (3)[4]http://www.greyhat.comThe threat may come from inside the organization, from disgruntled employees or consultants, or from the outside, from ex-employees, competitors, malicious hackers, or even terrorists. .(4) Common examples of security exploits are SQL injection, cross-site scripting and cross-site request forgery which abuse security holes that may result from substandard programming practice. Tools & Security exploits[5]http://en.wikipedia.org/wiki/Hacker_(computer_security)#Grey_hat[6] http://en.wikipedia.org/wikiExploit_(computer_security)Hackers aren't inherently bad — the word “hacker” doesn't mean “criminal” or “bad guy.” Geeks and tech writers often refer to “black hat,” “white hat,” and “gray hat” hackers. [2]Technology, Software, Laws/acts/organization for gray hat Technologies Digital forgery Hacking technologies Fraud technologies Scanners High techPrinters Espionage devices

Laws / Organizations DMCA( Digital Millennium Copyright Act)[7] http://www.vox.com/2014/12/14/7387945/sony-hack-explainedIn 2011 the Sony entertainment network was hacked by a grey hat hackerSony disregarded with assumption that the hacker will not attempt anything malicious So he posted over 50 million users email , and other security information online.Sony PlayStation network was down for 24 days costing Sony 171.000.000 $Also Sony lack of attention to the hacker at first solidifies The fact that even though its prominent of companies would never pressed charges against the seemingly inconsequential grey hat hackers potentially just as dangerous as black hat hackers .If that hacker had not posted the information online Sony would never have known that he stole so much user account information ..Conclusion Companies need to realize just how dangerous these grey hat hacker can be and start to prosecute them or malicious hackers will catch on and pretend to have good intentions .Companies all over the world need to act against grey hat hacker in the same fashion they would against a malicious and press charges . Thank YouCase EXTable of contentAbstractIntroductionTypes of HackersTools & Security exploits Technology for/against Software for/against Laws/acts/organization for/against Case Example Conclusion